By analyzing data gathered through Online Learning(OL)systems,data mining can be used to unearth hidden relationships between topics and trends in student ***,in this paper,we show how data mining techniques such as c...
详细信息
By analyzing data gathered through Online Learning(OL)systems,data mining can be used to unearth hidden relationships between topics and trends in student ***,in this paper,we show how data mining techniques such as clustering and association rule algorithms can be used on historical data to develop a unique recommendation system *** our implementation,we utilize historical data to generate association rules specifically for student test marks below a threshold of 60%.By focusing on marks below this threshold,we aim to identify and establish associations based on the patterns of weakness observed in the past ***,we leverage K-means clustering to provide instructors with visual representations of the generated *** strategy aids instructors in better comprehending the information and associations produced by the *** clustering helps visualize and organize the data in a way that makes it easier for instructors to analyze and gain insights,enabling them to support the verification of the relationship between *** can be a useful tool to deliver better feedback to students as well as provide better insights to instructors when developing their *** paper further shows a prototype implementation of the above-mentioned concepts to gain opinions and insights about the usability and viability of the proposed system.
Talking face generation aims to create realistic facial videos with lips precisely synchronized to the input audio, finding broad applications in human-computer interaction, virtual avatars, and video conferencing. De...
详细信息
In recent years, 2D digital human motion generation (DHMG) is becoming increasingly crucial for many areas such as virtual live broadcasting and film production. Although a lot of effort has been invested in DHMG, the...
详细信息
The percentage of encrypted network traffic has constantly increased as network security has been continuously improved. Attackers can, however, utilize encrypted DNS over HTTPS (DoH) to conceal their malicious traffi...
详细信息
This paper focuses on the dilemma faced by largescale multi-agent systems. With the increase of agent size, the policy search space grows exponentially, reaching the task complexity that is difficult for the current m...
详细信息
The ability to recommend candidate locations for service facility placement is crucial for the success of urban planning. Whether a location is suitable for establishing new facilities is largely determined by its pot...
详细信息
The ability to recommend candidate locations for service facility placement is crucial for the success of urban planning. Whether a location is suitable for establishing new facilities is largely determined by its potential popularity. However, it is a non-trivial task to predict popularity of candidate locations due to three significant challenges: 1) the spatio-temporal behavior correlations of urban dwellers, 2) the spatial correlations between candidate locations and existing facilities, and 3) the temporal auto-correlations of locations themselves. To this end, we propose a novel semi-supervised learning model, Spatio-Temporal Graph Convolutional and Recurrent Networks (STGCRN), aiming for popularity prediction and location recommendation. Specifically, we first partition the urban space into spatial neighborhood regions centered by locations, extract the corresponding features, and develop the location correlation graph. Next, a contextual graph convolution module based on the attention mechanism is introduced to incorporate local and global spatial correlations among locations. A recurrent neural network is proposed to capture temporal dependencies between locations. Furthermore, we adopt a location popularity approximation block to estimate the missing popularity from both the spatial and temporal domains. Finally, the overall implicit characteristics are concatenated and then fed into the recurrent neural network to obtain the ultimate popularity. The extensive experiments on two real-world datasets demonstrate the superiority of the proposed model compared with state-of-the-art baselines.
Action Instruction Generation (AIG) is a key step in semantic-driven action sequence generation, which aims to embed text instructions describing specific actions into the driving text. AIG is a challenging task that ...
详细信息
Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among ***,the reliability and integrity of learned Bayesian network models are highly dependent on the quality...
详细信息
Bayesian networks are a powerful class of graphical decision models used to represent causal relationships among ***,the reliability and integrity of learned Bayesian network models are highly dependent on the quality of incoming data *** of the primary challenges with Bayesian networks is their vulnerability to adversarial data poisoning attacks,wherein malicious data is injected into the training dataset to negatively influence the Bayesian network models and impair their *** this research paper,we propose an efficient framework for detecting data poisoning attacks against Bayesian network structure learning *** framework utilizes latent variables to quantify the amount of belief between every two nodes in each causal model over *** use our innovative methodology to tackle an important issue with data poisoning assaults in the context of Bayesian *** regard to four different forms of data poisoning attacks,we specifically aim to strengthen the security and dependability of Bayesian network structure learning techniques,such as the PC *** doing this,we explore the complexity of this area and offer workablemethods for identifying and reducing these sneaky ***,our research investigates one particular use case,the“Visit to Asia Network.”The practical consequences of using uncertainty as a way to spot cases of data poisoning are explored in this inquiry,which is of utmost *** results demonstrate the promising efficacy of latent variables in detecting and mitigating the threat of data poisoning ***,our proposed latent-based framework proves to be sensitive in detecting malicious data poisoning attacks in the context of stream data.
Graph classification, aiming at learning the graph-level representations for effective class assignments, has received outstanding achievements, which heavily relies on high-quality datasets that have balanced class d...
详细信息
Facial Expression Recognition (FER) is crucial for understanding human emotions, with applications spanning from mental health assessment to marketing recommendation systems. However, existing camera-based methods rai...
详细信息
暂无评论